[go: up one dir, main page]

CN106533966A - Network service resource arranging method and apparatus - Google Patents

Network service resource arranging method and apparatus Download PDF

Info

Publication number
CN106533966A
CN106533966A CN201611031521.9A CN201611031521A CN106533966A CN 106533966 A CN106533966 A CN 106533966A CN 201611031521 A CN201611031521 A CN 201611031521A CN 106533966 A CN106533966 A CN 106533966A
Authority
CN
China
Prior art keywords
network
terminal
network service
represent
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611031521.9A
Other languages
Chinese (zh)
Other versions
CN106533966B (en
Inventor
胡效赫
刘值
祝航
骆怡航
李军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Publication of CN106533966A publication Critical patent/CN106533966A/en
Application granted granted Critical
Publication of CN106533966B publication Critical patent/CN106533966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/76Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供一种网络服务的资源编排方法及装置,涉及通信网络领域。其中,所述方法包括:对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。通过本发明,不仅能够提高网络服务节点的资源利用率,而且还能够实现网络链路流量的负载均衡,支持网络服务资源的动态扩展。

The invention provides a network service resource arrangement method and device, and relates to the field of communication networks. Wherein, the method includes: formally describing the network topology and the network service respectively, and obtaining a first model corresponding to the network topology and a second model corresponding to the network service; according to the first model and the obtained The second model respectively constrains the network traffic path and the network service deployment node; determines the optimization goal of the resource arrangement of the network service according to the constraints of the network traffic path and the network service deployment node; adopts a greedy algorithm according to the optimization goal Optimizing is performed to obtain the resource arrangement result of the network service. The invention can not only improve the resource utilization rate of the network service node, but also realize the load balance of the network link flow, and support the dynamic expansion of the network service resource.

Description

一种网络服务的资源编排方法及装置Resource orchestration method and device for network service

技术领域technical field

本发明涉及网络通信技术领域,具体地,涉及一种网络服务的资源编排方法及装置。The present invention relates to the technical field of network communication, in particular, to a method and device for resource arrangement of network services.

背景技术Background technique

计算机网络的功能分为网络连通和网络服务两个主要方面。网络连通指的是进行路由选路以连接不同终端设备,面对网络路径失效问题,需要实现动态路由协议保证容错性,面对网络链路带宽限制,需要进行流量工程调节避免链路拥塞。网络服务为终端设备提供网络四到七层的功能服务,承载网络服务的中间设备部署于终端设备之间,处理流经的用户流量。网络服务可为终端设备提供安全检测,流量统计,网络加速等功能。网络服务通常被配置为功能序列,依据给定顺序提供多种网络服务的组合。The function of computer network is divided into two main aspects: network connection and network service. Network connectivity refers to routing to connect different terminal devices. In the face of network path failure, dynamic routing protocols need to be implemented to ensure fault tolerance. In the face of network link bandwidth limitations, traffic engineering adjustments are required to avoid link congestion. The network service provides terminal devices with functional services of the fourth to seventh layers of the network, and the intermediate device carrying the network service is deployed between the terminal devices to process the passing user traffic. Network services can provide security detection, traffic statistics, network acceleration and other functions for terminal equipment. Web services are usually configured as functional sequences, providing a combination of multiple web services in a given order.

软件定义网络和网络功能虚拟化是当前网络发展中的重要技术。软件定义网络是通过转发设备开放接口和逻辑上集中控制,在转发设备中部署对应规则,实现对网络流量的精细化控制。网络功能虚拟化指的是利用虚拟化技术将专有中间设备的网络功能运行在通用处理平台上,实现网络功能资源的动态分配与扩展。Software-defined networking and network function virtualization are important technologies in the current network development. Software-defined networking implements fine-grained control of network traffic through open interfaces and logically centralized control of forwarding devices, and deploys corresponding rules in forwarding devices. Network function virtualization refers to the use of virtualization technology to run the network function of proprietary intermediate equipment on a general-purpose processing platform to realize the dynamic allocation and expansion of network function resources.

现有的网络服务采用静态资源编排方法。受硬件设备封闭的限制,网络服务部署在网关或网络流量汇聚处,通过预先评估部署点所需中间设备的处理能力,启用对应处理性能的中间设备。此外,现有的网络服务借助软件定义网络技术,可以实现中间设备的负载均衡。针对静态启用的中间设备,可以通过流量牵引对网络流量路径进行选择,使不同的中间设备处理不同用户间的网络流量,将网络流量依消耗处理能力的先后均匀分布在对应的中间设备上,可以实现中间设备的负载均衡。Existing web services adopt static resource orchestration method. Restricted by the closure of hardware devices, network services are deployed at gateways or network traffic convergence points. By pre-evaluating the processing capabilities of intermediate devices required at deployment points, intermediate devices with corresponding processing performance are enabled. In addition, existing network services can achieve load balancing of intermediate devices with the help of software-defined network technology. For the statically enabled intermediate devices, the network traffic path can be selected through traffic traction, so that different intermediate devices can process the network traffic between different users, and the network traffic can be evenly distributed on the corresponding intermediate devices according to the order of consumption of processing power. Realize load balancing of intermediate devices.

现有的网络服务的资源编排方法,受技术限制,无法实现多目标优化,具体存在如下功能缺陷:Due to technical limitations, the existing resource orchestration methods for network services cannot achieve multi-objective optimization, and specifically have the following functional defects:

(1)静态资源编排方法,部署于网关节点处,网络流量大,需要高处理性能的中间设备支持,成本较高。(1) The static resource orchestration method is deployed at the gateway node, and the network traffic is large, which requires the support of intermediate equipment with high processing performance, and the cost is relatively high.

(2)静态资源编排方法,在网络流量持续增长而现有中间设备无法提供足够的处理能力时,需要进行纵向扩展,替换为处理性能更高的中间设备,扩展性差,升级成本高。(2) The static resource orchestration method, when the network traffic continues to grow and the existing intermediate equipment cannot provide sufficient processing capacity, it needs to be vertically expanded and replaced with an intermediate equipment with higher processing performance, which has poor scalability and high upgrade costs.

(3)静态资源编排方法,使用流量牵引增加了链路带宽的消耗,未对链路带宽的资源消耗进行约束,存在产生链路拥塞的问题。(3) The static resource orchestration method uses traffic traction to increase the consumption of link bandwidth, but does not constrain the resource consumption of link bandwidth, and there is a problem of link congestion.

发明内容Contents of the invention

本发明的目的是提供一种网络服务的资源编排方法及装置。其中,所述方法所要解决的技术问题是:如何降低网络服务的多点故障概率,并避免产生网络链路的拥塞。The purpose of the present invention is to provide a resource orchestration method and device for network services. Wherein, the technical problem to be solved by the method is: how to reduce the multi-point failure probability of network services and avoid network link congestion.

为了实现上述目的,本发明提供一种网络服务的资源编排方法。所述方法包括:In order to achieve the above purpose, the present invention provides a resource orchestration method for network services. The methods include:

对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;Formally describing the network topology and the network service respectively, to obtain a first model corresponding to the network topology and a second model corresponding to the network service;

根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;Constraining network traffic paths and network service deployment nodes respectively according to the first model and the second model;

根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;determining an optimization target of resource orchestration of the network service according to the network traffic path and the constraints of the network service deployment node;

根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。The greedy algorithm is used for optimization according to the optimization objective, and the resource arrangement result of the network service is obtained.

可选地,所述第一模型为:Optionally, the first model is:

G=(V,E,C)G=(V,E,C)

其中,G表示所述网络拓扑,V表示网络节点的集合,E表示网络链路的集合,C表示终端流量带宽的集合。Wherein, G represents the network topology, V represents a collection of network nodes, E represents a collection of network links, and C represents a collection of terminal traffic bandwidth.

可选地,所述第二模型为:Optionally, the second model is:

其中,Dst表示终端s到终端t的流量Tst对应的网络服务,表示网络功能mi在功能序列中的部署顺序,N表示大于或等于零的整数,s,t∈H,H表示终端主机的集合,n表示大于或等于1的整数。Among them, D st represents the network service corresponding to the traffic T st from terminal s to terminal t, Indicates the deployment order of the network function mi in the function sequence, N represents an integer greater than or equal to zero, s, t∈H , H represents the set of end hosts, and n represents an integer greater than or equal to 1.

可选地,所述网络流量路径的约束为:Optionally, the constraints of the network traffic path are:

其中,s,t∈H,H表示终端主机的集合,i,j∈V,V表示网络节点的集合,(i,j)∈E,E表示网络链路的集合,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(i,j),取1值表示终端s到终端t的流量Tst经过网络链路(i,j),k∈V,(j,k)∈E,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(j,k),取1值表示终端s到终端t的流量Tst经过网络链路(j,k),为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络节点i,取1值表示终端s到终端t的流量Tst经过网络节点i,max(*,*)表示两个数值之中的较大值,(j,i)∈E,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(j,i),取1值表示终端s到终端t的流量Tst经过网络链路(j,i),Cst表示终端s到终端t的流量Tst所占用的网络链路带宽资源,L表示网络链路(i,j)使用网络链路带宽资源的上界。Among them, s, t ∈ H, H represents the set of terminal hosts, i, j ∈ V, V represents the set of network nodes, (i, j) ∈ E, E represents the set of network links, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (i, j), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (i, j) j), k∈V, (j,k)∈E, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (j, k), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (j, k) k), is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through network node i, taking a value of 1 means that the traffic T st from terminal s to terminal t passes through network node i, and max(*, *) means The larger of two values, (j,i)∈E, It is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (j, i), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (j, i) i), C st represents the network link bandwidth resources occupied by the traffic T st from terminal s to terminal t, and L represents the upper bound of network link bandwidth resources used by network link (i, j).

可选地,所述网络服务部署节点的约束为:Optionally, the constraints of the network service deployment node are:

其中,s,t∈H,H表示终端主机的集合,i,j∈V,V表示网络节点的集合,mp∈W,W表示网络功能的集合,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络节点i,取1值表示终端s到终端t的流量Tst经过网络节点i,为0-1变量,取0值表示网络节点i处未使用网络功能mp处理从终端s到终端t的流量Tst,取1值表示网络节点i处使用网络功能mp处理从终端s到终端t的流量Tst表示网络功能mp在功能序列中的部署顺序,分别表示辅助变量,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(i,j),取1值表示终端s到终端t的流量Tst经过网络链路(i,j),N表示大于或等于零的整数,mq∈W,表示网络功能mq在功能序列中的部署顺序,为0-1变量,取0值表示网络节点i处未使用网络功能mq处理从终端s到终端t的流量Tst,取1值表示网络节点i处使用网络功能mq处理从终端s到终端t的流量Tst表示网络功能mp处理从终端s到终端t的流量Tst所需消耗的计算资源,Bi表示网络节点i处总的计算资源,M表示计算机中能表示的最大值,K表示部署有网络服务的节点的总数,zi为0-1变量,取0值表示网络节点i处未部署任何网络服务,取1值表示网络节点i处部署有网络服务。Among them, s, t ∈ H, H represents the set of terminal hosts, i, j ∈ V, V represents the set of network nodes, m p ∈ W, W represents the set of network functions, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through network node i, taking a value of 1 means that the traffic T st from terminal s to terminal t passes through network node i, is a 0-1 variable, taking a value of 0 means that network node i does not use the network function m p to process the traffic T st from terminal s to terminal t, and taking a value of 1 means that network node i uses the network function m p to process traffic from terminal s to terminal t The flow T st of terminal t, Denotes the deployment order of the network function m p in the function sequence, and represent the auxiliary variables, respectively, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (i, j), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (i, j) j), N represents an integer greater than or equal to zero, m q ∈ W, Indicates the deployment order of the network function m q in the function sequence, is a 0-1 variable, taking a value of 0 means that network node i does not use the network function m q to process the traffic T st from terminal s to terminal t, and taking a value of 1 means that network node i uses the network function m q to process traffic from terminal s to terminal t The flow T st of terminal t, Indicates the computing resources consumed by the network function m p to process the traffic T st from the terminal s to the terminal t, B i represents the total computing resources at the network node i, M represents the maximum value that can be expressed in the computer, and K represents the deployed network The total number of service nodes, z i is a 0-1 variable, a value of 0 indicates that no network service is deployed at network node i, and a value of 1 indicates that network service is deployed at network node i.

可选地,所述优化目标为:Optionally, the optimization objective is:

min(λ1L+λ2K)min(λ 1 L+λ 2 K)

其中,min(*)表示求最小值,L表示网络链路(i,j)使用网络链路带宽资源的上界,K表示部署有网络服务的节点的总数,λ1与λ2为管理员或应用程序设定的参数,且λ12=1。Among them, min(*) means seeking the minimum value, L means the upper bound of network link bandwidth resources used by network link (i, j), K means the total number of nodes deployed with network services, λ 1 and λ 2 are administrators Or a parameter set by an application program, and λ 12 =1.

可选地,所述方法还包括:Optionally, the method also includes:

在所述网络服务的网络服务规则变化或所述网络服务所需的处理能力增加的情况下,调整所述网络服务部署节点,并增量更新所述网络流量路径。When the network service rule of the network service changes or the processing capability required by the network service increases, the network service deployment node is adjusted, and the network traffic path is incrementally updated.

相应地,本发明还提供一种网络服务的资源编排装置。所述装置包括:Correspondingly, the present invention also provides a network service resource arrangement device. The devices include:

描述单元,用于对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;A description unit, configured to formally describe the network topology and the network service respectively, to obtain a first model corresponding to the network topology and a second model corresponding to the network service;

约束单元,用于根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;a constraint unit, configured to respectively constrain network traffic paths and network service deployment nodes according to the first model and the second model;

确定单元,用于根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;A determining unit, configured to determine an optimization target of resource orchestration of the network service according to the network traffic path and the constraints of the network service deployment node;

优化单元,用于根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。The optimization unit is configured to perform optimization by using a greedy algorithm according to the optimization target, and obtain the resource arrangement result of the network service.

可选地,所述第一模型为:Optionally, the first model is:

G=(V,E,C)G=(V,E,C)

其中,G表示所述网络拓扑,V表示网络节点的集合,E表示网络链路的集合,C表示终端流量带宽的集合。Wherein, G represents the network topology, V represents a collection of network nodes, E represents a collection of network links, and C represents a collection of terminal traffic bandwidth.

可选地,所述第二模型为:Optionally, the second model is:

其中,Dst表示终端s到终端t的流量Tst对应的网络服务,表示网络功能mi在功能序列中的部署顺序,N表示大于或等于零的整数,s,t∈H,H表示终端主机的集合,n表示大于或等于1的整数。Among them, D st represents the network service corresponding to the traffic T st from terminal s to terminal t, Indicates the deployment order of the network function mi in the function sequence, N represents an integer greater than or equal to zero, s, t∈H , H represents the set of end hosts, and n represents an integer greater than or equal to 1.

由上述技术方案可知,对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;并根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;再根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;再根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果,既规划了网络流量路径,又确定了网络服务部署节点,能够实现计算资源的高利用率和链路带宽资源的负载均衡,从而降低网络服务的多点故障概率,并避免产生网络链路的拥塞。It can be seen from the above technical solution that the network topology and the network service are formally described respectively to obtain a first model corresponding to the network topology and a second model corresponding to the network service; and according to the first model and the obtained The second model respectively constrains the network traffic path and the network service deployment node; and then determines the optimization target of resource orchestration of the network service according to the constraints of the network traffic path and the network service deployment node; and then adopts according to the optimization target The greedy algorithm is optimized to obtain the resource orchestration result of the network service, which not only plans the network traffic path, but also determines the network service deployment node, which can achieve high utilization of computing resources and load balancing of link bandwidth resources, thereby reducing network traffic. Multi-point failure probability of services and avoid congestion of network links.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following briefly introduces the drawings required for the description of the embodiments or the prior art. Apparently, the drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other drawings based on these drawings without any creative effort.

图1是本发明一实施例提供的网络服务的资源编排方法的流程图;FIG. 1 is a flow chart of a resource orchestration method for network services provided by an embodiment of the present invention;

图2是本发明一实施例提供的网络拓扑的示意图;Fig. 2 is a schematic diagram of a network topology provided by an embodiment of the present invention;

图3是本发明一实施例提供的网络服务规则的示意图;Fig. 3 is a schematic diagram of a network service rule provided by an embodiment of the present invention;

图4是本发明一实施例提供的网络服务的资源编排装置的结构示意图;FIG. 4 is a schematic structural diagram of a resource orchestration device for network services provided by an embodiment of the present invention;

图5是本发明又一实施例提供的网络服务的资源编排装置的结构示意图。Fig. 5 is a schematic structural diagram of a resource orchestration device for network services provided by another embodiment of the present invention.

具体实施方式detailed description

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

图1是本发明一实施例提供的网络服务的资源编排方法的流程图。如图1所示,本发明一实施例提供的网络服务的资源编排方法包括:FIG. 1 is a flow chart of a resource orchestration method for network services provided by an embodiment of the present invention. As shown in FIG. 1, a method for orchestrating resources of a network service provided by an embodiment of the present invention includes:

在步骤S101中,对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型。In step S101, the network topology and the network service are formally described respectively to obtain a first model corresponding to the network topology and a second model corresponding to the network service.

其中,所述第一模型为:Wherein, the first model is:

G=(V,E,C)G=(V,E,C)

其中,G表示所述网络拓扑,V表示网络节点的集合,E表示网络链路的集合,C表示终端流量带宽的集合。Wherein, G represents the network topology, V represents a collection of network nodes, E represents a collection of network links, and C represents a collection of terminal traffic bandwidth.

其中,所述第二模型为:Wherein, the second model is:

其中,Dst表示终端s到终端t的流量Tst对应的网络服务,表示网络功能mi在功能序列中的部署顺序,N表示大于或等于零的整数,s,t∈H,H表示终端主机的集合,n表示大于或等于1的整数。Among them, D st represents the network service corresponding to the traffic T st from terminal s to terminal t, Indicates the deployment order of the network function mi in the function sequence, N represents an integer greater than or equal to zero, s, t∈H , H represents the set of end hosts, and n represents an integer greater than or equal to 1.

具体地,网络拓扑包括主机分布、转发设备分布和网络链路带宽。对网络拓扑形式化描述为G=(V,E,C),V为网络节点的集合,E为网络链路的集合,代表终端主机的集合,C为终端流量带宽的集合。网络服务涉及防火墙、入侵检测、流量统计和应用代理等多种网络功能,不同网络功能按特定序列组合为用户提供网络服务。对网络服务进行形式化描述,可得到网络功能集合W={m1,m2,…,mn},终端s到终端t的流量Tst(s,t∈H)对应网络服务为代表网络功能mi在功能序列中的部署顺序,取值小时顺序在前,取0值表示Tst不被网络功能mi所处理。Specifically, the network topology includes host distribution, forwarding device distribution, and network link bandwidth. Formally describe the network topology as G=(V,E,C), V is a collection of network nodes, E is a collection of network links, Represents the collection of terminal hosts, and C is the collection of terminal traffic bandwidth. Network services involve various network functions such as firewall, intrusion detection, traffic statistics and application proxy, and different network functions are combined in a specific sequence to provide users with network services. Formally describe the network service, the network function set W={m 1 ,m 2 ,…,m n } can be obtained, the traffic T st (s,t∈H) corresponding to the network service from terminal s to terminal t is Represents the deployment order of the network function mi in the function sequence, The order of values is hour first, A value of 0 indicates that T st is not processed by network function mi .

接着,在步骤S102中,根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点。Next, in step S102, network traffic paths and network service deployment nodes are constrained respectively according to the first model and the second model.

其中,所述网络流量路径的约束为:Wherein, the constraints of the network traffic path are:

其中,s,t∈H,H表示终端主机的集合,i,j∈V,V表示网络节点的集合,(i,j)∈E,E表示网络链路的集合,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(i,j),取1值表示终端s到终端t的流量Tst经过网络链路(i,j),k∈V,(j,k)∈E,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(j,k),取1值表示终端s到终端t的流量Tst经过网络链路(j,k),为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络节点i,取1值表示终端s到终端t的流量Tst经过网络节点i,max(*,*)表示两个数值之中的较大值,(j,i)∈E,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(j,i),取1值表示终端s到终端t的流量Tst经过网络链路(j,i),Cst表示终端s到终端t的流量Tst所占用的网络链路带宽资源,L表示网络链路(i,j)使用网络链路带宽资源的上界。Among them, s, t ∈ H, H represents the set of terminal hosts, i, j ∈ V, V represents the set of network nodes, (i, j) ∈ E, E represents the set of network links, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (i, j), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (i, j) j), k∈V, (j,k)∈E, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (j, k), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (j, k) k), is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through network node i, taking a value of 1 means that the traffic T st from terminal s to terminal t passes through network node i, and max(*, *) means The larger of two values, (j,i)∈E, It is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (j, i), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (j, i) i), C st represents the network link bandwidth resources occupied by the traffic T st from terminal s to terminal t, and L represents the upper bound of network link bandwidth resources used by network link (i, j).

其中,所述网络服务部署节点的约束为:Wherein, the constraints of the network service deployment node are:

其中,s,t∈H,H表示终端主机的集合,i,j∈V,V表示网络节点的集合,mp∈W,W表示网络功能的集合,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络节点i,取1值表示终端s到终端t的流量Tst经过网络节点i,为0-1变量,取0值表示网络节点i处未使用网络功能mp处理从终端s到终端t的流量Tst,取1值表示网络节点i处使用网络功能mp处理从终端s到终端t的流量Tst表示网络功能mp在功能序列中的部署顺序,分别表示辅助变量,为0-1变量,取0值表示终端s到终端t的流量Tst未经过网络链路(i,j),取1值表示终端s到终端t的流量Tst经过网络链路(i,j),N表示大于或等于零的整数,mq∈W,表示网络功能mq在功能序列中的部署顺序,为0-1变量,取0值表示网络节点i处未使用网络功能mq处理从终端s到终端t的流量Tst,取1值表示网络节点i处使用网络功能mq处理从终端s到终端t的流量Tst表示网络功能mp处理从终端s到终端t的流量Tst所需消耗的计算资源,Bi表示网络节点i处总的计算资源,M表示计算机中能表示的最大值,K表示部署有网络服务的节点的总数,zi为0-1变量,取0值表示网络节点i处未部署任何网络服务,取1值表示网络节点i处部署有网络服务。Among them, s, t ∈ H, H represents the set of terminal hosts, i, j ∈ V, V represents the set of network nodes, m p ∈ W, W represents the set of network functions, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through network node i, taking a value of 1 means that the traffic T st from terminal s to terminal t passes through network node i, is a 0-1 variable, taking a value of 0 means that network node i does not use the network function m p to process the traffic T st from terminal s to terminal t, and taking a value of 1 means that network node i uses the network function m p to process traffic from terminal s to terminal t The flow T st of terminal t, Denotes the deployment order of the network function m p in the function sequence, and represent the auxiliary variables, respectively, is a 0-1 variable, taking a value of 0 means that the traffic T st from terminal s to terminal t does not pass through the network link (i, j), and taking a value of 1 means that the traffic T st from terminal s to terminal t passes through the network link (i, j) j), N represents an integer greater than or equal to zero, m q ∈ W, Indicates the deployment order of the network function m q in the function sequence, is a 0-1 variable, taking a value of 0 means that network node i does not use the network function m q to process the traffic T st from terminal s to terminal t, and taking a value of 1 means that network node i uses the network function m q to process traffic from terminal s to terminal t The flow T st of terminal t, Indicates the computing resources consumed by the network function m p to process the traffic T st from the terminal s to the terminal t, B i represents the total computing resources at the network node i, M represents the maximum value that can be expressed in the computer, and K represents the deployed network The total number of service nodes, z i is a 0-1 variable, a value of 0 indicates that no network service is deployed at network node i, and a value of 1 indicates that network service is deployed at network node i.

具体地,对于网络流量路径的约束,设定终端之间的流量为单通路且无环。针对网络服务部署节点的约束,网络服务满足保序性和唯一性。此外,通过引入辅助变量,对网络服务部署节点约束进行建模,辅助变量随网络流量从源节点到目的节点递增保序,服务规则的功能参数与辅助变量同序。Specifically, for the constraints on the network traffic path, it is set that the traffic between terminals is single-path and acyclic. Aiming at the constraints of network service deployment nodes, network services satisfy order preservation and uniqueness. In addition, by introducing auxiliary variables, the network service deployment node constraints are modeled. The order of the auxiliary variables increases with the network traffic from the source node to the destination node. The function parameters of the service rules are in the same order as the auxiliary variables.

紧接着,在步骤S103中,根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标。Next, in step S103, an optimization target of resource orchestration of the network service is determined according to the network traffic path and constraints of the network service deployment node.

其中,所述优化目标为:Wherein, the optimization objective is:

min(λ1L+λ2K)min(λ 1 L+λ 2 K)

其中,min(*)表示求最小值,L表示网络链路(i,j)使用网络链路带宽资源的上界,K表示部署有网络服务的节点的总数,λ1与λ2为管理员或应用程序设定的参数,且λ12=1。Among them, min(*) means seeking the minimum value, L means the upper bound of network link bandwidth resources used by network link (i, j), K means the total number of nodes deployed with network services, λ 1 and λ 2 are administrators Or a parameter set by an application program, and λ 12 =1.

具体地,网络服务的资源编排需满足多种优化目标,为实现网络链路流量的负载均衡,有Lmin,即最小化网络链路的最大负载,为提高网络服务节点的资源利用率,避免分散节点部署增加故障率,有Kmin,即最小化网络服务部署节点的总数。Specifically, the resource orchestration of network services needs to meet various optimization objectives. In order to achieve load balancing of network link traffic, there is L min , that is, to minimize the maximum load of network links. In order to improve the resource utilization of network service nodes, avoid Decentralized node deployment increases the failure rate, and there is K min , which minimizes the total number of network service deployment nodes.

将多目标优化问题转化为单目标优化问题,优化目标为:Transform the multi-objective optimization problem into a single-objective optimization problem, and the optimization objective is:

min(λ1L+λ2K)min(λ 1 L+λ 2 K)

其中,λ1与λ2为管理员或应用程序设定的参数,未手动设定时缺省λ1=Kmin/(Lmin+Kmin),λ2=Lmin/(Lmin+Kmin),Lmin与Kmin为各自在单目标优化问题中所取最小值。Among them, λ 1 and λ 2 are the parameters set by the administrator or the application program. If not manually set, the default λ 1 =K min /(L min +K min ), λ 2 =L min /(L min +K min min ), L min and K min are the minimum values taken in the single-objective optimization problem.

最后,在步骤S104中,根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。Finally, in step S104, a greedy algorithm is used for optimization according to the optimization target, and a resource arrangement result of the network service is obtained.

具体地,采用贪婪算法进行优化的过程如下:Specifically, the optimization process using the greedy algorithm is as follows:

S1、初始化未编排的网络服务规则集合,包含所有输入规则,每条规则指定某两终端之间的流量所需的逻辑网络服务序列。初始化已编排的网络服务规则集合,为空集。S1. Initialize an unorganized network service rule set, including all input rules, and each rule specifies a logical network service sequence required by traffic between certain two terminals. Initializes the set of orchestrated web service rules, which is an empty set.

S2、若未编排的网络服务规则集合为空,转至步骤S12,否则选取未编排的网络服务规则集合中所需网络服务处理能力最少的规则r。S2. If the unorganized network service rule set is empty, go to step S12; otherwise, select the rule r that requires the least network service processing capacity in the unorganized network service rule set.

S3、按先后顺序依次选取规则r中的网络服务m。S3. Select the network service m in the rule r in sequence.

S4、选取已部署有网络服务的节点中剩余计算资源最多的节点,部署网络服务m,若可行,转至S7,否则现有部署节点的剩余资源均不满足部署条件。S4. Select the node with the most remaining computing resources among the nodes that have deployed the network service, and deploy the network service m. If it is feasible, go to S7. Otherwise, the remaining resources of the existing deployed nodes do not meet the deployment conditions.

S5、选取未部署网络服务的节点中计算资源最多的节点,部署网络服务m,若可行,转至S7,否则规则r无法部署。S5. Select the node with the most computing resources among the nodes that have not deployed the network service, deploy the network service m, if feasible, go to S7, otherwise the rule r cannot be deployed.

S6、将规则r标记为无法部署放入已编排集合中,转至S2。S6. Mark the rule r as undeployable and put it into the orchestrated set, and go to S2.

S7、循环步骤S3-S6直到规则r中的网络服务的部署节点全部确定。S7. Steps S3-S6 are repeated until all deployment nodes of the network service in rule r are determined.

S8、将规则r中网络服务的部署节点组成序列P,将规则r中的源终端s和目的终端t,分别加入序列P的首尾。S8. Form the deployment nodes of the network service in the rule r into a sequence P, and add the source terminal s and the destination terminal t in the rule r to the beginning and end of the sequence P respectively.

S9、依次选取序列P中的网络节点对(pi,pi+1)i=1,2,…,|P|-1。S9. Select a network node pair (p i , p i+1 ) i=1, 2, . . . , |P|-1 in the sequence P sequentially.

S10、选取网络节点pi到节点pi+1的所有路径中网络链路已使用带宽资源最低的路径,部署对应转发规则。S10. Select the path with the lowest bandwidth resource used by the network link among all the paths from the network node p i to the node p i+1 , and deploy the corresponding forwarding rule.

S11、循环步骤S9-S10直到序列P中所有网络节点对间均有路径可达,转至步骤S2。S11. Repeat steps S9-S10 until all network node pairs in the sequence P have reachable paths, and go to step S2.

S12、所有输入规则的网络服务部署节点及相应网络流量路径确定,网络服务的资源编排完成。S12. The network service deployment nodes and corresponding network traffic paths of all input rules are determined, and the network service resource arrangement is completed.

优选地,所述方法还包括:在所述网络服务的网络服务规则变化或所述网络服务所需的处理能力增加的情况下,调整所述网络服务部署节点,并增量更新所述网络流量路径。藉此,支持网络服务的动态扩展Preferably, the method further includes: when the network service rule of the network service changes or the processing capability required by the network service increases, adjusting the network service deployment node and incrementally updating the network traffic path. In this way, dynamic expansion of network services is supported

具体地,本实施例提供的网络服务的资源编排方法能够自适应资源约束和服务规则的变化,动态更新部署结果。在资源约束方面,当所部署规则消耗的网络服务处理能力增加,超过当前部署节点处理能力上限,可以依据步骤S4-S5选取新的部署节点,依据步骤S10选取更新后网络节点与序列中相邻部署节点间的转发路径。在服务规则方面,存在修改、增加和删除服务规则三种情况,对于删除服务规则即删除对应部署的转发规则以及部署节点上的网络服务资源,对于增加服务规则依照步骤S3-S11进行处理,对于修改规则采用删除原服务规则和增加新修改后的服务规则两步完成。Specifically, the resource orchestration method for network services provided in this embodiment can adapt to changes in resource constraints and service rules, and dynamically update deployment results. In terms of resource constraints, when the network service processing capacity consumed by the deployment rules increases and exceeds the upper limit of the processing capacity of the current deployment node, a new deployment node can be selected according to steps S4-S5, and the updated network node can be selected according to step S10 and adjacent deployments in the sequence Forwarding paths between nodes. In terms of service rules, there are three cases of modifying, adding, and deleting service rules. For deleting a service rule, it means deleting the corresponding deployed forwarding rules and network service resources on the deployment node. For adding a service rule, follow steps S3-S11. For Modifying the rules is done in two steps: deleting the original service rules and adding new and modified service rules.

本实施例通过对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;并根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;再根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;再根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果,既规划了网络流量路径,又确定了网络服务部署节点,能够实现计算资源的高利用率和链路带宽资源的负载均衡,从而降低网络服务的多点故障概率,并避免产生网络链路的拥塞。In this embodiment, a first model corresponding to the network topology and a second model corresponding to the network service are obtained by formally describing the network topology and the network service respectively; and according to the first model and the second model The two models respectively constrain the network traffic path and the network service deployment node; then determine the optimization goal of the resource arrangement of the network service according to the constraints of the network traffic path and the network service deployment node; and then adopt a greedy algorithm according to the optimization goal Optimizing to obtain the resource orchestration result of the network service, not only planning the network traffic path, but also determining the network service deployment node, can achieve high utilization of computing resources and load balancing of link bandwidth resources, thereby reducing network service Multi-point failure probability, and avoid congestion of network links.

图2是本发明一实施例提供的网络拓扑的示意图。图3是本发明一实施例提供的网络服务规则的示意图。结合图2和图3对本发明的具体实施方式作进一步的详细说明。图2中的网络拓扑和图3中的网络服务规则可应用于云数据中心、运营商网络以及企业网中。图2中包含4个终端H1-H4,6个转发设备SW1-SW6,其中SW5与SW6处部署网络服务的处理能力上限为10,SW1-SW4处部署网络服务的计算能力上限为8。如图3所示,为H1至H2的流量提供安全检测、防火墙FW和入侵检测IDS等功能,H1至H2的流量大小为1,需要FW和IDS的处理能力分别为2和3;为H1至H3流量提供安全检测和网络加速服务,FW和IDS以及代理功能Proxy,H1至H3的流量大小为2,需要FW和IDS的处理能力为4和6,Proxy的处理能力为3;为H1至H4流量提供网络加速服务,Proxy,H1至H4的流量大小为4,Proxy处理能力为6。Fig. 2 is a schematic diagram of a network topology provided by an embodiment of the present invention. Fig. 3 is a schematic diagram of a network service rule provided by an embodiment of the present invention. The specific embodiment of the present invention will be further described in detail with reference to FIG. 2 and FIG. 3 . The network topology in Figure 2 and the network service rules in Figure 3 can be applied to cloud data centers, operator networks, and enterprise networks. Figure 2 contains 4 terminals H1-H4 and 6 forwarding devices SW1-SW6, where the upper limit of the processing capability of network services deployed at SW5 and SW6 is 10, and the upper limit of computing capabilities of network services deployed at SW1-SW4 is 8. As shown in Figure 3, security detection, firewall FW and intrusion detection IDS functions are provided for the traffic from H1 to H2. H3 traffic provides security detection and network acceleration services, FW, IDS and proxy function Proxy, the traffic size of H1 to H3 is 2, the processing capacity of FW and IDS is required to be 4 and 6, and the processing capacity of Proxy is 3; for H1 to H4 Traffic provides network acceleration services, proxy, the traffic size of H1 to H4 is 4, and the proxy processing capacity is 6.

由此得到,网络拓扑为:As a result, the network topology is:

G=(V,E,C)G=(V,E,C)

V={H1,H2,H3,H4,S1,S2,S3,S4,S5,S6}V={H1,H2,H3,H4,S1,S2,S3,S4,S5,S6}

H={H1,H2,H3,H4}H={H1,H2,H3,H4}

E={(H1,S1),(S1,S2),(S1,S5),(S5,S6),(S6,S2),(S6,S4),(S3,S4),(S3,S5),(H2,S2),(H3,S3),(H4,S4)},E={(H1,S1),(S1,S2),(S1,S5),(S5,S6),(S6,S2),(S6,S4),(S3,S4),(S3,S5) ,(H2,S2),(H3,S3),(H4,S4)},

C={CH1H2=1,CH1H3=2,CH1H4=4}C={C H1H2 =1, C H1H3 =2, C H1H4 =4}

其中,CH1H2表示终端H1到终端H2的流量所占用的网络链路带宽资源,CH1H3表示终端H1到终端H3的流量所占用的网络链路带宽资源,CH1H4表示终端H1到终端H4的流量所占用的网络链路带宽资源。Among them, C H1H2 represents the network link bandwidth resource occupied by the flow from terminal H1 to terminal H2 , C H1H3 represents the network link bandwidth resource occupied by the flow from terminal H1 to terminal H3 , and C H1H4 represents the terminal H1 Network link bandwidth resource occupied by traffic to terminal H4 .

由此得到,网络服务为:As a result, the network service is:

W={m1=FW,m2=IDS,m3=Proxy}W={m 1 =FW, m 2 =IDS, m 3 =Proxy}

网络服务规则 web service rules

网络服务规则 web service rules

网络服务规则 web service rules

其中,Dst表示终端s到终端t的流量Tst对应的网络服务,表示网络功能mi在功能序列中的部署顺序。Among them, D st represents the network service corresponding to the traffic T st from terminal s to terminal t, Denotes the deployment order of network function mi in the function sequence.

由此得到,网络流量路径的约束为:As a result, the constraints of the network traffic path are:

由此得到,网络服务部署节点的约束为:From this, the constraints of network service deployment nodes are:

由此得到,优化目标为:As a result, the optimization objective is:

min0.2L+0.8Kmin0.2L+0.8K

由此得到,采用贪婪算法的优化过程具体为:As a result, the optimization process using the greedy algorithm is specifically:

L1、初始化未编排网络服务规则集合Φ={DH1H2,DH1H3,DH1H4},已编排网络服务规则集合 L1. Initialize the unorganized network service rule set Φ = {D H1H2 , D H1H3 , D H1H4 }, the programmed network service rule set

L2、若Φ为空,转至步骤L12,否则选取Φ中所需网络服务处理能力最少的规则r,即首先选取DH1H2L2. If Φ is empty, go to step L12, otherwise select the rule r in Φ that requires the least network service processing capacity, that is, first select D H1H2 .

L3、按先后顺序依次选取规则r中的网络服务m,对DH1H2,依次选取FW和IDS。L3. Select the network service m in the rule r in sequence, and for D H1H2 , select the FW and IDS in sequence.

L4、选取已部署有网络服务的节点中剩余计算资源最多的网络节点,部署网络服务m,若可行,转至L7,否则现有部署节点的剩余资源均不满足部署条件,对DH1H2中的FW无现有部署节点进行下一步,对DH1H2中的IDS现有部署节点SW5剩余资源最多为8(已部署有DH1H2的FW),可部署IDS。L4. Select the network node that has the most remaining computing resources among the nodes that have already deployed network services, and deploy network service m. If it is feasible, go to L7. Otherwise, the remaining resources of the existing deployed nodes do not meet the deployment conditions. For D H1H2 The FW has no existing deployment node to proceed to the next step. The remaining resource of the existing deployment node SW5 of the IDS in D H1H2 is at most 8 (the FW of D H1H2 has already been deployed), and the IDS can be deployed.

L5、选取未部署网络服务的节点中资源最多的节点,部署网络服务m,若可行,转至L7,否则规则r无法部署,对DH1H2中的FW选取节点SW5。L5. Select the node with the most resources among the nodes that have not deployed the network service, deploy the network service m, if feasible, go to L7, otherwise the rule r cannot be deployed, and select the node SW5 for the FW in D H1H2 .

L6、将规则r标记为无法部署放入已编排集合中,转至L2。L6. Mark the rule r as undeployable and put it into the orchestrated set, and turn to L2.

L7、循环步骤L3-L6直到规则r中的网络服务的部署节点全部确定。L7. Repeat steps L3-L6 until all deployment nodes of the network service in rule r are determined.

L8、将规则r中网络服务的部署节点组成序列P,将规则r中的源终端s和目的终端t,分别加入序列P的首尾,对DH1H2 L8. The deployment nodes of the network service in the rule r form a sequence P, and the source terminal s and the destination terminal t in the rule r are respectively added to the beginning and end of the sequence P. For D H1H2 ,

L9、依次选取序列P中的节点对(pi,pi+1)i=1,2,…,|P|-1,对节点对为(H1,SW5FW)(SW5FW,W5IDS)(W5IDS,H2)。L9. Select the node pair (p i , p i+1 )i=1,2,...,|P|-1 in the sequence P in sequence, and pair The node pair is (H1,SW5 FW )(SW5 FW ,W5 IDS )(W5 IDS ,H2).

L10、选取网络节点pi到节点pi+1的所有路径中网络链路已使用带宽资源最低的路径,部署对应转发规则,(H1,SW5FW)的路径为H1-SW1-SW5,(SW5FW,SW5IDS)的路径为SW5。L10. Select the path with the lowest bandwidth resource used by the network link among all the paths from the network node p i to the node p i+1 , and deploy the corresponding forwarding rule. The path of (H1, SW5 FW ) is H1-SW1-SW5, (SW5 FW , SW5 IDS ) path is SW5.

L11、循环步骤L9-L10直到序列P中所有节点对间均有路径可达,转至L2。L11. Repeat steps L9-L10 until there are reachable paths between all node pairs in the sequence P, and go to L2.

L12、所有输入规则的网络服务部署节点及相应网络流量路径确定,网络服务的资源编排完成。L12. The network service deployment nodes and corresponding network traffic paths of all input rules are determined, and the resource arrangement of network services is completed.

本实施例提供的网络服务的资源编排方法能够自适应资源约束和服务规则的变化,动态更新部署结果。在资源约束方面,当所部署规则消耗的网络服务处理能力增加,超过当前部署节点处理能力上限,可以依据步骤L4-L5选取新的部署节点,依据步骤L10选取更新后网络节点与序列中相邻部署节点间的转发路径。在服务规则方面,存在修改、增加和删除服务规则三种情况,对于删除服务规则即删除对应部署的转发规则以及部署节点上的网络服务资源,对于增加服务规则依照步骤L3-L11进行处理,对于修改规则采用删除原服务规则和增加新修改后的服务规则两步完成。The resource orchestration method for network services provided in this embodiment can adapt to changes in resource constraints and service rules, and dynamically update deployment results. In terms of resource constraints, when the network service processing capacity consumed by the deployed rules increases and exceeds the upper limit of the processing capacity of the current deployment node, a new deployment node can be selected according to steps L4-L5, and the updated network node and adjacent deployment in the sequence can be selected according to step L10 Forwarding paths between nodes. In terms of service rules, there are three cases of modifying, adding, and deleting service rules. For deleting a service rule, it means deleting the corresponding deployed forwarding rules and network service resources on the deployment node. For adding a service rule, follow steps L3-L11. For Modifying the rules is done in two steps: deleting the original service rules and adding new and modified service rules.

本发明实施例基于软件定义网络和网络功能虚拟化技术,为使计算机网络对用户提供多种网络服务,通过对网络拓扑和网络服务序列进行联合建模,对网络链路带宽资源和支持网络服务部署的计算资源进行编排,规划网络流量路径,确定网络服务部署节点,实现计算资源的高利用率和链路带宽资源的负载均衡。The embodiment of the present invention is based on software-defined network and network function virtualization technology. In order to enable the computer network to provide users with various network services, by jointly modeling the network topology and network service sequence, the network link bandwidth resources and supporting network services The deployed computing resources are orchestrated, network traffic paths are planned, and network service deployment nodes are determined to achieve high utilization of computing resources and load balancing of link bandwidth resources.

在具体的实施方式中,本发明实施例可以应用于运营商网络、数据中心网络以及企业网中,为用户提供稳定可扩展的网络服务,优化网络链路负载,节约网络运营成本。In a specific implementation manner, the embodiments of the present invention can be applied to operator networks, data center networks, and enterprise networks to provide users with stable and scalable network services, optimize network link loads, and save network operating costs.

对于方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明实施例并不受所描述的动作顺序的限制,因为依据本发明实施例,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明实施例所必须的。For the method embodiment, for the sake of simple description, it is expressed as a series of action combinations, but those skilled in the art should know that the embodiment of the present invention is not limited by the described action order, because according to the embodiment of the present invention , certain steps may be performed in other order or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification belong to preferred embodiments, and the actions involved are not necessarily required by the embodiments of the present invention.

图4是本发明一实施例提供的网络服务的资源编排装置的结构示意图。如图4所示,本发明一实施例提供的网络服务的资源编排装置包括描述单元201、约束单元202、确定单元203和优化单元204,其中:Fig. 4 is a schematic structural diagram of a resource orchestration device for network services provided by an embodiment of the present invention. As shown in FIG. 4, the resource orchestration device for network services provided by an embodiment of the present invention includes a description unit 201, a constraint unit 202, a determination unit 203, and an optimization unit 204, wherein:

描述单元201,用于对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;A description unit 201, configured to formally describe the network topology and the network service respectively, to obtain a first model corresponding to the network topology and a second model corresponding to the network service;

约束单元202,用于根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;A constraining unit 202, configured to constrain network traffic paths and network service deployment nodes respectively according to the first model and the second model;

确定单元203,用于根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;A determining unit 203, configured to determine an optimization target of resource orchestration of the network service according to the network traffic path and the constraints of the network service deployment node;

优化单元204,用于根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。The optimization unit 204 is configured to use a greedy algorithm to optimize according to the optimization target, and obtain a resource arrangement result of the network service.

本实施例提供的网络服务的资源编排装置适用于以上实施例对应的网络服务的资源编排方法,在此不再赘述。The network service resource orchestration device provided in this embodiment is applicable to the network service resource orchestration method corresponding to the above embodiments, and will not be repeated here.

本实施例提供一种网络服务的资源编排装置,描述单元201用于对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;约束单元202用于根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;确定单元203用于根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;优化单元204用于根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果,既规划了网络流量路径,又确定了网络服务部署节点,能够实现计算资源的高利用率和链路带宽资源的负载均衡,从而降低网络服务的多点故障概率,并避免产生网络链路的拥塞。This embodiment provides a resource orchestration device for network services. The description unit 201 is used to formally describe the network topology and the network service respectively, and obtain the first model corresponding to the network topology and the first model corresponding to the network service. Two models; the constraining unit 202 is configured to constrain the network traffic path and the network service deployment node respectively according to the first model and the second model; the determining unit 203 is configured to constrain the network traffic path and the network service deployment node according to the network traffic path The constraint determines the optimization goal of the resource arrangement of the network service; the optimization unit 204 is used to optimize according to the optimization goal using a greedy algorithm to obtain the resource arrangement result of the network service, which not only plans the network traffic path, but also determines the network traffic path. Service deployment nodes can achieve high utilization of computing resources and load balancing of link bandwidth resources, thereby reducing the probability of multi-point failure of network services and avoiding network link congestion.

在本发明一可选实施例中,所述第一模型为:In an optional embodiment of the present invention, the first model is:

G=(V,E,C)G=(V,E,C)

其中,G表示所述网络拓扑,V表示网络节点的集合,E表示网络链路的集合,C表示终端流量带宽的集合。Wherein, G represents the network topology, V represents a collection of network nodes, E represents a collection of network links, and C represents a collection of terminal traffic bandwidth.

在本发明一可选实施例中,所述第二模型为:In an optional embodiment of the present invention, the second model is:

其中,Dst表示终端s到终端t的流量Tst对应的网络服务,表示网络功能mi在功能序列中的部署顺序,N表示大于或等于零的整数,s,t∈H,H表示终端主机的集合,n表示大于或等于1的整数。Among them, D st represents the network service corresponding to the traffic T st from terminal s to terminal t, Indicates the deployment order of the network function mi in the function sequence, N represents an integer greater than or equal to zero, s, t∈H , H represents the set of end hosts, and n represents an integer greater than or equal to 1.

图5是本发明又一实施例提供的网络服务的资源编排装置的结构示意图。如图5所示,所述网络服务的资源编排装置包括:处理器(processor)301、存储器(memory)302和通信总线304;Fig. 5 is a schematic structural diagram of a resource orchestration device for network services provided by another embodiment of the present invention. As shown in FIG. 5 , the resource orchestration device of the network service includes: a processor (processor) 301, a memory (memory) 302 and a communication bus 304;

其中,所述处理器301、存储器302通过所述通信总线304完成相互间的通信;Wherein, the processor 301 and the memory 302 complete mutual communication through the communication bus 304;

所述处理器301用于调用所述存储器302中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。The processor 301 is used to call the program instructions in the memory 302 to execute the methods provided by the above method embodiments, for example, including: formally describing the network topology and network services respectively, and obtaining The corresponding first model and the second model corresponding to the network service; according to the first model and the second model respectively constrain the network traffic path and the network service deployment node; according to the network traffic path and the network The constraint of the service deployment node determines the optimization target of the resource arrangement of the network service; according to the optimization target, a greedy algorithm is used for optimization to obtain the resource arrangement result of the network service.

本实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如包括:对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。This embodiment discloses a computer program product, the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, and when the program instructions are executed by the computer, the computer The method provided by each of the foregoing method embodiments can be executed, for example, including: formally describing the network topology and the network service respectively, and obtaining a first model corresponding to the network topology and a second model corresponding to the network service; Constraining network traffic paths and network service deployment nodes respectively according to the first model and the second model; determining an optimization target of resource orchestration of the network service according to constraints of the network traffic paths and the network service deployment nodes; The greedy algorithm is used for optimization according to the optimization objective, and the resource arrangement result of the network service is obtained.

本实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:对网络拓扑和网络服务分别进行形式化描述,得到与所述网络拓扑对应的第一模型和与所述网络服务对应的第二模型;根据所述第一模型和所述第二模型分别约束网络流量路径和网络服务部署节点;根据所述网络流量路径和所述网络服务部署节点的约束确定所述网络服务的资源编排的优化目标;根据所述优化目标采用贪婪算法进行优化,得到所述网络服务的资源编排结果。This embodiment provides a non-transitory computer-readable storage medium, the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the methods provided in the above method embodiments, for example, including : formally describe the network topology and the network service respectively, obtain a first model corresponding to the network topology and a second model corresponding to the network service; constrain respectively according to the first model and the second model The network traffic path and the network service deployment node; determine the optimization target of resource orchestration of the network service according to the constraints of the network traffic path and the network service deployment node; optimize according to the optimization target using a greedy algorithm, and obtain the Resource orchestration results for web services.

本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the steps for realizing the above-mentioned method embodiments can be completed by hardware related to program instructions, and the aforementioned program can be stored in a computer-readable storage medium. When the program is executed, the It includes the steps of the above method embodiments; and the aforementioned storage medium includes: ROM, RAM, magnetic disk or optical disk and other various media that can store program codes.

以上所描述的基站等实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The base station and other embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, Located in one place, or can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. It can be understood and implemented by those skilled in the art without any creative effort.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。Through the above description of the implementations, those skilled in the art can clearly understand that each implementation can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware. Based on this understanding, the essence of the above technical solution or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in computer-readable storage media, such as ROM/RAM, magnetic discs, optical discs, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments.

最后应说明的是:以上各实施例仅用以说明本发明的实施例的技术方案,而非对其限制;尽管参照前述各实施例对本发明的实施例进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明的实施例各实施例技术方案的范围。Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the embodiments of the present invention, rather than to limit them; although the embodiments of the present invention have been described in detail with reference to the foregoing embodiments, those skilled in the art The skilled person should understand that: it is still possible to modify the technical solutions described in the foregoing embodiments, or perform equivalent replacements for some or all of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the present invention The scope of the technical solution of each embodiment of the embodiment.

Claims (10)

1. the resource method of combination of a kind of network service, it is characterised in that methods described includes:
Formalized description is carried out respectively to network topology and network service, obtain the first model corresponding with the network topology and The second model corresponding with the network service;
According to first model and second model difference constraint network flow path and Web Service Deployment node;
Determine that according to the constraint of the network traffics path and the Web Service Deployment node resource of the network service is compiled The optimization aim of row;
It is optimized using greedy algorithm according to the optimization aim, obtains the resource layout result of the network service.
2. the resource method of combination of network service according to claim 1, it is characterised in that first model is:
G=(V, E, C)
Wherein, G represents the network topology, and V represents the set of network node, and E represents the set of network link, and C represents terminal The set of flow bandwidth.
3. the resource method of combination of network service according to claim 1, it is characterised in that second model is:
D s t = { d i s t | d i s t ∈ N , 0 ≤ d i s t ≤ n , i = 1 , ... , n }
Wherein, DstRepresent terminal s to the flow T of terminal tstCorresponding network service,Represent network function miIn functional sequence In deployment order, N represents the integer more than or equal to zero, s, t ∈ H, and H represents the set of end host, and n is represented and is more than or waits In 1 integer.
4. the resource method of combination of network service according to claim 1, it is characterised in that the network traffics path It is constrained to:
∀ s , t ∈ H : Σ i ∈ V : ( i , j ) ∈ E x i j s t - Σ i ∈ V : ( j , k ) ∈ E x j k s t = 1 , j = t 0 , j ≠ s , t , j ∈ V - 1 , j = s
∀ s , t ∈ H a n d i ∈ V : y i s t = m a x ( Σ j ∈ V : ( j , i ) ∈ E x j i s t , Σ j ∈ V : ( i , j ) ∈ E x i j s t )
∀ s , t ∈ H a n d i ∈ V : y i s t ≤ 1
∀ i , j ∈ V a n d ( i , j ) ∈ E : Σ s , t ∈ H x i j s t . C s t ≤ L
Wherein, s, t ∈ H, H represent the set of end host, i, j ∈ V, and V represents the set of network node, and (i, j) ∈ E, E are represented The set of network link,For 0-1 variables, take 0 value and represent terminal s to the flow T of terminal tstWithout network link (i, j), Taking 1 value represents terminal s to the flow T of terminal tstThrough network link (i, j), k ∈ V, (j, k) ∈ E,For 0-1 variables, 0 is taken Value represents terminal s to the flow T of terminal tstWithout network link (j, k), take 1 value and represent terminal s to the flow T of terminal tst Through network link (j, k),For 0-1 variables, take 0 value and represent terminal s to the flow T of terminal tstWithout network node i, Taking 1 value represents terminal s to the flow T of terminal tstThrough network node i, max (*, *) represents the higher value among two values, (j, i) ∈ E,For 0-1 variables, take 0 value and represent terminal s to the flow T of terminal tstWithout network link (j, i), 1 value is taken Represent terminal s to the flow T of terminal tstThrough network link (j, i), CstRepresent terminal s to the flow T of terminal tstShared Network link bandwidth resources, L represent the upper bound of the network link (i, j) using network link bandwidth resources.
5. the resource method of combination of network service according to claim 1, it is characterised in that the Web Service Deployment section That what is put is constrained to:
∀ s , t ∈ H a n d i ∈ V a n d m p ∈ W : g i p s t ≤ y i s t
∀ s , t ∈ H a n d i ∈ V a n d m p ∈ W a n d d p s t ≠ 0 : Σ i ∈ V g i p s t = 1
∀ s , t ∈ H a n d i , j ∈ V : u i s t - u j s t + | V | x i j s t ≤ | V | - 1
∀ s , t ∈ H a n d i ∈ V : 1 ≤ u i s t ≤ | V | , u i s t ∈ N
∀ s , t ∈ H a n d i , j ∈ V a n d m p , m q ∈ W : ( d q s t - d p s t ) ( u i s t - u j s t ) ≤ | W | | V | ( 2 - g i p s t - g i q s t )
∀ i ∈ V : Σ p ∈ N Σ s , t ∈ H g i p s t A p s t ≤ B i
∀ i ∈ V : Σ p ∈ N Σ s , t ∈ H g i p s t ≤ Mz i
Σ i ∈ V z i = K
Wherein, s, t ∈ H, H represent the set of end host, and i, j ∈ V, V represent the set of network node, mp∈ W, W represent network The set of function,For 0-1 variables, take 0 value and represent terminal s to the flow T of terminal tstWithout network node i, 1 value table is taken Show terminal s to the flow T of terminal tstThrough network node i,For 0-1 variables, take 0 value and represent unused net at network node i Network function mpProcess the flow T from terminal s to terminal tst, take 1 value and represent at network node i using network function mpProcess from end Flow Ts of the end s to terminal tst,Represent network function mpDeployment order in functional sequence,WithAuxiliary is represented respectively Variable,For 0-1 variables, take 0 value and represent terminal s to the flow T of terminal tstWithout network link (i, j), take 1 value and represent Flow T of terminal s to terminal tstThrough network link (i, j), N represents the integer more than or equal to zero, mq∈ W,Represent net Network function mqDeployment order in functional sequence,For 0-1 variables, take 0 value and represent uses no network function at network node i mqProcess the flow T from terminal s to terminal tst, take 1 value and represent at network node i using network function mqProcess from terminal s to The flow T of terminal tst,Represent network function mpProcess the flow T from terminal s to terminal tstThe computing resource of required consumption, BiComputing resource total at network node i is represented, the maximum that M can be represented in representing computer, K are represented and be deployed with network service Node sum, ziFor 0-1 variables, take 0 value and represent and at network node i, do not dispose any network service, take 1 value and represent network Network service is deployed with node i.
6. the resource method of combination of network service according to claim 1, it is characterised in that the optimization aim is:
min(λ1L+λ2K)
Wherein, min (*) represents and minimizes that L represents the upper bound of the network link (i, j) using network link bandwidth resources, K tables Show the sum of the node for being deployed with network service, λ1With λ2For keeper or the parameter of application setting, and λ12=1.
7. the resource method of combination of network service according to claim 1, it is characterised in that methods described also includes:
In the case where the disposal ability needed for the network service rule change of the network service or the network service increases, Adjust the Web Service Deployment node, and network traffics path described in incremental update.
8. the resource layout device of a kind of network service, it is characterised in that described device includes:
Description unit, for carrying out formalized description respectively to network topology and network service, obtains and the network topology pair The first model answered and the second model corresponding with the network service;
Constraint element, for according to first model and second model difference constraint network flow path and network service Deployment node;
Determining unit, for determining the network according to the constraint in the network traffics path and the Web Service Deployment node The optimization aim of the resource layout of service;
Optimization unit, for being optimized using greedy algorithm according to the optimization aim, obtains the resource of the network service Layout result.
9. the resource layout device of network service according to claim 8, it is characterised in that first model is:
G=(V, E, C)
Wherein, G represents the network topology, and V represents the set of network node, and E represents the set of network link, and C represents terminal The set of flow bandwidth.
10. the resource layout device of network service according to claim 8, it is characterised in that second model is:
D s t = { d i s t | d i s t ∈ N , 0 ≤ d i s t ≤ n , i = 1 , ... , n }
Wherein, DstRepresent terminal s to the flow T of terminal tstCorresponding network service,Represent network function miIn functional sequence In deployment order, N represents the integer more than or equal to zero, s, t ∈ H, and H represents the set of end host, and n is represented and is more than or waits In 1 integer.
CN201611031521.9A 2016-05-27 2016-11-18 A kind of the resource method of combination and device of network service Active CN106533966B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2016103659240 2016-05-27
CN201610365924 2016-05-27

Publications (2)

Publication Number Publication Date
CN106533966A true CN106533966A (en) 2017-03-22
CN106533966B CN106533966B (en) 2019-05-14

Family

ID=58356115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611031521.9A Active CN106533966B (en) 2016-05-27 2016-11-18 A kind of the resource method of combination and device of network service

Country Status (1)

Country Link
CN (1) CN106533966B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483286A (en) * 2017-08-14 2017-12-15 电子科技大学 A Method of Merging and Deploying Service Function Chains Based on Cloud-Fog Environment
CN107800571A (en) * 2017-10-23 2018-03-13 清华大学 A kind of network function dynamic method of combination, device and system
CN108600101A (en) * 2018-03-21 2018-09-28 北京交通大学 A kind of network for the optimization of end-to-end time delay performance services cross-domain method of combination
CN108718246A (en) * 2018-04-03 2018-10-30 华中科技大学 A kind of resource regulating method and system of network-oriented virtualization of function
CN108737192A (en) * 2018-06-01 2018-11-02 北京航空航天大学 Network service dispositions method based on service reliability
CN113381868A (en) * 2020-03-09 2021-09-10 中国电信股份有限公司 Network arranging method and device and computer readable storage medium
CN114584376A (en) * 2022-03-04 2022-06-03 中电科网络空间安全研究院有限公司 Traffic handling method, device, equipment and computer readable storage medium
CN117278403A (en) * 2023-09-18 2023-12-22 之江实验室 An incremental compilation method and system based on heterogeneous devices
US12204880B1 (en) 2023-09-18 2025-01-21 Zhejiang Lab Incremental compiling method and system based on heterogeneous device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894152A (en) * 2010-06-29 2010-11-24 华中师范大学 A Learning Content Generation Method Based on Resource Package
CN102546735A (en) * 2011-01-04 2012-07-04 中兴通讯股份有限公司 Cloud computing system, cloud computing method and cloud
CN104917629A (en) * 2015-04-14 2015-09-16 中国人民解放军信息工程大学 Multi-switching-node cooperation meta-ability scheduling method
CN105281955A (en) * 2015-10-27 2016-01-27 上海华为技术有限公司 Business and resource orchestration system, method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894152A (en) * 2010-06-29 2010-11-24 华中师范大学 A Learning Content Generation Method Based on Resource Package
CN102546735A (en) * 2011-01-04 2012-07-04 中兴通讯股份有限公司 Cloud computing system, cloud computing method and cloud
CN104917629A (en) * 2015-04-14 2015-09-16 中国人民解放军信息工程大学 Multi-switching-node cooperation meta-ability scheduling method
CN105281955A (en) * 2015-10-27 2016-01-27 上海华为技术有限公司 Business and resource orchestration system, method and device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483286A (en) * 2017-08-14 2017-12-15 电子科技大学 A Method of Merging and Deploying Service Function Chains Based on Cloud-Fog Environment
CN107483286B (en) * 2017-08-14 2021-01-26 电子科技大学 Method for merging and deploying service function chain based on cloud-fog environment
CN107800571A (en) * 2017-10-23 2018-03-13 清华大学 A kind of network function dynamic method of combination, device and system
CN107800571B (en) * 2017-10-23 2019-11-22 清华大学 A method, device and system for dynamically orchestrating network functions
CN108600101A (en) * 2018-03-21 2018-09-28 北京交通大学 A kind of network for the optimization of end-to-end time delay performance services cross-domain method of combination
CN108718246A (en) * 2018-04-03 2018-10-30 华中科技大学 A kind of resource regulating method and system of network-oriented virtualization of function
CN108737192B (en) * 2018-06-01 2020-07-07 北京航空航天大学 Network service deployment method based on service reliability
CN108737192A (en) * 2018-06-01 2018-11-02 北京航空航天大学 Network service dispositions method based on service reliability
CN113381868A (en) * 2020-03-09 2021-09-10 中国电信股份有限公司 Network arranging method and device and computer readable storage medium
CN114584376A (en) * 2022-03-04 2022-06-03 中电科网络空间安全研究院有限公司 Traffic handling method, device, equipment and computer readable storage medium
CN114584376B (en) * 2022-03-04 2024-04-26 中电科网络空间安全研究院有限公司 Traffic handling method, device, equipment and computer readable storage medium
CN117278403A (en) * 2023-09-18 2023-12-22 之江实验室 An incremental compilation method and system based on heterogeneous devices
CN117278403B (en) * 2023-09-18 2024-05-24 之江实验室 An incremental compilation method and system based on heterogeneous devices
US12204880B1 (en) 2023-09-18 2025-01-21 Zhejiang Lab Incremental compiling method and system based on heterogeneous device

Also Published As

Publication number Publication date
CN106533966B (en) 2019-05-14

Similar Documents

Publication Publication Date Title
CN106533966A (en) Network service resource arranging method and apparatus
EP2890054B1 (en) System and method for designing a network for one or more entities in an enterprise
CN103731307B (en) A kind of for multiple services standardized data face dynamic reconfiguration method
US20050228850A1 (en) Method and apparatus for allocating resources to applications
US11979290B2 (en) Controlling parallel data processing for service function chains
CN108234169B (en) Real-time dynamic optimization method for distributed simulation network structure
CN107666412A (en) The virtual network function dispositions method of service function chain
JP2017518720A (en) Proactive network failure handling
CN108989207A (en) Route decision method, device and SDN equipment
JPWO2012141241A1 (en) Network, data transfer node, communication method and program
US12143267B2 (en) Network optimization for hybrid quantum-classical networks
CN106209615A (en) A kind of Dynamic Route Control method calculating forward-path based on SPFA algorithm
Salih et al. OpenFlow 1.3 extension for OMNeT++
CN108400922A (en) virtual local area network configuration system and method and computer program product thereof
CN117201365A (en) Flow rate determination method, device, electronic equipment and storage medium
Aly Generic controller adaptive load balancing (GCALB) for SDN networks
CN109831319B (en) Network function deployment method considering multidimensional resource constraints
CN102845042A (en) System and method for aggregating bandwidth of multiple active physical interfaces on application layer
Dias de Assunção et al. On designing SDN services for energy-aware traffic engineering
Zhou et al. Automatically Correcting Networks with {NEAt}
Sun et al. Minimizing network complexity through integrated top-down design
Nedyalkov et al. Modeling of the convergence time of an IP-based network with different traffic loads
Cheng et al. An effective flow-rule-reducing algorithm for flow tables in software-defined networks
CN111147302B (en) Network virtualization implementation method and system
CN109756932B (en) Two-stage deployment method of network functions in 5G cellular core network scene

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant